Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping?

A. Encrypt it with Joe’s private key
B. Encrypt it with Joe’s public key
C. Encrypt it with Ann’s private key
D. Encrypt it with Ann’s public key


Answer: D. Encrypt it with Ann’s public key

Computer Science & Information Technology

You might also like to view...

Identify three characteristics that Microsoft suggests for a strong password.

What will be an ideal response?

Computer Science & Information Technology

When transporting a cellular telephone as evidence you want to prevent anyone from making contact with the device. In order to do that, you store the phone in a __________________

a. Lead-lined container b. Box lined with aluminum foil c. Waterproof bag d. Faraday bag

Computer Science & Information Technology

All of the following are sections in a medical report except ____.

A. body B. heading C. reference D. conclusion

Computer Science & Information Technology

Which one of the following tag sets creates a table row?

a.

...
b. ... c. ... d. ...

Computer Science & Information Technology